期刊文献+

一种新的RBAC角色协同关系及其Petri网模型 被引量:4

A Novel Role Coordination Relation of RBAC and Its Petri Net Model
下载PDF
导出
摘要 角色授权约束是RBAC研究的重要内容 .有效表达多角色授权和激活的序约束是一个难点问题 .提出了新的角色授权协同及其序关系 ,扩展了现有的角色关系概念 ,使RBAC能够表达复杂的角色授权和激活序约束 .其次 。 Role authorization constraint is one of focal points of RBAC research.It is a difficult problem to effectively represent the authorization and activation order constraints of multiple roles.Novel role authorization coordination relations were presented and coordination order relations such that existing role relation concepts are expanded.It is able to make RBAC represent complex order constraints when granting or activating multiple roles.The new Petri Net to analyze and simulate the consistence of role authorization coordination as well as its order relation is proposed.
出处 《电子学报》 EI CAS CSCD 北大核心 2003年第2期225-227,共3页 Acta Electronica Sinica
基金 国家自然科学基金 (No .699730 0 3) 国家"863"计划 (No.2 0 0 2AA1 4 30 2 1 ) 国防预研C3I基金 (No .EP990 2 7)
关键词 RBAC 授权协同关系 激活协同关系 序关系 时间PETRI网 RBAC authorization coordination relation activation coordination relation order relation timed Petri nets
  • 相关文献

参考文献5

  • 1刘婷,林闯,刘卫东.基于时间Petri网的工作流系统模型的线性推理[J].电子学报,2002,30(2):245-248. 被引量:34
  • 2王小明,赵宗涛,冯德民.一种动态角色委托代理授权模型[J].计算机科学,2002,29(2):66-68. 被引量:14
  • 3Sandhu D Ferraiolo, R Kuhn. The NIST model for role-based access control:towards a unified standdard . In the Proceedings of 5^th ACM Workshop on Role-based Access Control. USA: ACM, 2000.60- 110.
  • 4D Richard kuhn. Mutual exclusion of roles as a means of implementing separation of duty in role-based access controlsystems [A] .In the Proceedings of the Second ACM Workshop on Role-based Access Control[ C]. USA : ACM, 1997. 240 - 252.
  • 5R Sandhu, P Samarafi. Access control principles and practice[J]. IEEE Comm, 1999:40- 48.

二级参考文献17

  • 1[1]W M P van der Aalst.The application of Petri nets to workflow management [J].Journal of Circuits,Systems,and Computers,1998,8(1):21-66.
  • 2[2]W M P van der Aalst.Chapter 10;Three Good reasons for Using a Petri-net-based Workflow Management System.In T.WaKaYaMa et al.,editor,Information and Process Integration in Enterprises;Rethinking documents [M].The Kluwer International Series in Engineering and Computer Science,Kluwer Academic Publishers,Norwell,1998:161-182.
  • 3[3]C A Ellis,K Keddara,G Rozenberg.Dynamic change within workflow systems [J].In N.Comstock and C.Ellis,editors,Conf.on Organizational Computing Systems,ACM,SIGOIS,Milpitas,CA(1995):10-21.
  • 4[4]W M P van der Aalst.Verification of workflow tast structures [A].Information Systems,2000,25(1):43-69.
  • 5[5]Zaidi A K.On temporal logic programming using Petri nets [J].IEEE Transactions on Systems,Man and Cybernetics,May 1999,29(3):245-254.
  • 6[6]Yao Y.A Petri net model for temporal knowledge representation and reasoning [J].IEEE Trans.Systems,Man,and Cybernetics,1994,24(9):1374-1382.
  • 7[7]Lin C,Chanson S T.Logical inference of clauses based on Petri net models [J].International Journal of Intelligent Systems,John Wiley & Sons,August 1998,13:821-840.
  • 8[8]Lin C,Chaudhury A,Whinston A B,Marinescu D C.Logical inference of Horn clauses in Petri net models [J].IEEE Trans.on Knowledge and Data Engineering,June 1993,5(4):416-425.
  • 9Department of Defence (USA). Department of Defense Trusted Computer system evaluation criteria. DoD 5200-78-STD, DoD,1985
  • 10Sandhu R,Ferraiolo D, Kuhn R. The NIST model for role-based access control: towards a unified standard. In: Proc. of 5th ACM Workshop on Role-Based Access Control, ACM, Berlin, Germany, July, 2000

共引文献46

同被引文献40

  • 1C Bettini, S Jajodia. Provisions and obligations in policy management and security applications [ A ]. In the proceedings of the 28th VLDB conference[ C ]. USA: VLDB press, 2002.
  • 2S Jajodia, V Subrahmanian. Provisionalauthorizations [ M]. USA: KluwerAcademic Press,2001.133 - 159.
  • 3C Bettini, S Jajodia. Obligation monitor in policy management [A ]. In the proceedings of the IEEK 3td intemal c~ference on policies for distributed systems and network[ C ]. USA: lEEK Press, 2002.158- 178.
  • 4R T Simon, M E Zurko. Separation of duty in role-based environments[A] .Proceedings of ACM on Computer Foundations Workshop[ C].USA:ACM Press, 1997.43 - 55.
  • 5N W Paton,O Diaz. Active database system[J]. ACM Computing Surveys, 1999,31(1) :63 - 103.
  • 6F Ferraiolo,R Sandhu,R Kuhn.Proposed NIST standard for role-based access control[J].ACM Transaction on Information and System Security,2001,4(3):224-274.
  • 7E Bertino,C Bettini.An access control model supporting periodicity constraints and temporal reasoning[J].ACM Transactions on Database Systems,1998,23(3):231-285.
  • 8L GiuRi,P IgLio.A formal model for role-based access control with constrains[A].In the Proceedings of the 9th IEEE Workshop on Computer Security Foundations[C].USA:IEEE Press,1996.136-145.
  • 9Trent Jaeger.On the increasing importance of constraints[A].In the Proceedings of the 4th ACM Workshop on Role-Based Access Control[C].USA:ACM Press,1999.33-42.
  • 10E Bertino,P A Bonatti,E Ferrari.TRBAC:A temporal role-based access control model[J].ACM Transactions on Information and System Security,2001,4(3):58-90.

引证文献4

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部